News & Analysis as of

Software Developers Data Security

Sheppard Mullin Richter & Hampton LLP

Colorado Introduces an AI Consumer Protection Bill

Colorado is the latest state to introduce a bill focused on consumer protection issues when companies develop AI tools. The bill imposes obligations on developers and deployers of AI systems. Additionally, the bill provides...more

HaystackID

U.S. Unveils Historic Sanctions Against Intellexa Spyware for Endangering Privacy and National Security

HaystackID on

Editor's Note: In a historic and bold move, the U.S. government has implemented unprecedented sanctions against the Intellexa Consortium and its key figures for their roles in deploying spyware that jeopardizes privacy and...more

Rothwell, Figg, Ernst & Manbeck, P.C.

White House AI Order Balances Innovation And Regulation

On Oct. 30, President Joe Biden issued an executive order on safe, secure and trustworthy artificial intelligence. The executive order provides a sprawling list of directives aimed at establishing standards for AI safety...more

ArentFox Schiff

The Generative AI Revolution: Key Legal Considerations for the Nonprofit & Trade Association Industry

ArentFox Schiff on

Generative Artificial Intelligence (AI) is already transforming the way we live and work. Within two months of its initial release to the public, ChatGPT reached 100 million monthly active users, making it the fastest-growing...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

Spilman Thomas & Battle, PLLC

Tech Vendors and Cybersecurity – Are They Responsible?

It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you if its product is compromised and results in a data...more

Baker Donelson

Software Developers With Federal Government Customers Must Provide Confirmation of NIST Standards

Baker Donelson on

In mid-September, the Office of Management and Budget (OMB) released a memorandum requiring federal agencies to obtain attestation from software developers before running third-party software on government networks. Under...more

Sheppard Mullin Richter & Hampton LLP

2021 Cybersecurity Recap for Government Contractors (and What to Expect in 2022) – Part 1 of 4: Biden’s Cybersecurity Executive...

As 2021 draws to a close, we wanted to share a recap of some of the most important cybersecurity developments we covered this past year along with some suggestions on what companies (particularly those that do business with...more

Akin Gump Strauss Hauer & Feld LLP

NIST Seeks Public Comment on Eight Emerging Technology Areas to Advance More Productive Tech Economy

The National Institute of Standards and Technology (NIST) issued a request for public comment to help guide the development of the current and future state of technology in eight emerging technology areas. Those areas include...more

McDermott Will & Emery

NIST Publishes Draft Security Criteria for Consumer Software

McDermott Will & Emery on

Consumer software providers will soon have the option to label their software as compliant with National Institute of Standards and Technology (NIST) standards for software security. On November 1, 2021, NIST published its...more

Goodwin

Biden Executive Order Likely to Push Private Sector Forward on Cybersecurity

Goodwin on

On May 12, President Biden signed an Executive Order on Improving the Nation’s Cybersecurity. The order comes on the heels of a number of recent widely reported cybersecurity crises, including the Solar Winds and Microsoft...more

Sheppard Mullin Richter & Hampton LLP

FTC and Software Company Reach Security Settlement Over Unfair Practices

The FTC recently settled with Infotrax Systems, L.C. a technology company providing software to the direct sales industry. The settlement followed a breach suffered by the company, and involved allegations the company had...more

Dorsey & Whitney LLP

CCPA Requires “Reasonable Security”: but You Can’t have Reasonable Security Without Proper Vulnerability Management

Dorsey & Whitney LLP on

With the California Consumer Privacy Act (“CCPA”) set to take effect on January 1, 2020, and the resulting looming specter of statutory damages and data breach class action litigation for failure to implement “reasonable...more

Faegre Drinker Biddle & Reath LLP

NIST Unveils IoT Baseline of Core Cybersecurity Features for Comment

In a release aptly labeled “A Starting Point for IoT Device Manufacturers” the National Institute of Standards and Technology (NIST), an arm of the Department of Commerce, recently added to the discussion with the...more

Jones Day

Jones Day Global Privacy & Cybersecurity Update | Vol. 21

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Evaluates Advances in Face Recognition Software - On November 30, 2018, the National Institute of Standards and Technology ("NIST") published a...more

White and Williams LLP

PCI SSC Issues New Standards for Payment Software

White and Williams LLP on

The Payment Card Industry Security Standards Council (PCI SSC) has issued a new Software Security Framework for secure payment software. The new framework includes both a Secure Software Standard and Secure Software Life...more

Robinson+Cole Data Privacy + Security Insider

California Tackles IoT Security With New Bill

The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Mintz - Privacy & Cybersecurity Viewpoints

Trump Administration Botnet Report Will Impact IoT Device Makers – Things You Should Know

Manufacturers of wireless devices used for Internet of Things (IoT) applications should take heed of new Trump Administration proposals aimed at reducing the cybersecurity threats from botnets and other automated and...more

Mintz - Real Estate, Construction &...

Blockchains and Land Title Records

Blockchains, best known as the technology behind digital currencies such as Bitcoin and Ethereum, are beginning to be implemented in a variety of commercial applications. The technology is attracting not only financial...more

Fisher Phillips

Why Your Company Should Be Using Email Enterprise Vaults, Anti-Deletion Programming and Key Stroke Surveillance Software in the...

Fisher Phillips on

Twenty-five years ago most companies’ greatest fear of espionage was employee theft at the photocopy machine at 2 in the morning. The company playbook could not be forwarded in an email or put on a thumb drive in a matter of...more

Kelley Drye & Warren LLP

Vermont Settles with B2B Software Developer over Security Practices

Kelley Drye & Warren LLP on

Yesterday, the Vermont Attorney General announced a settlement with business-to-business software developer Entrinsik, Inc., resolving allegations that the company’s Informer program violated Vermont law, including the law...more

Cooley LLP

Alert: FCC Proposes New Rules for Competitive Set Top Boxes

Cooley LLP on

On February 18, the FCC adopted a notice of proposed rulemaking that proposes new rules intended to open up the market for devices and software used to transmit video programming from multichannel video providers ("MVPDs") to...more

King & Spalding

“Bug Bounty” Programs Grow In Popularity

King & Spalding on

In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide